An End-to-End Video Content Encryption Module for HLS Video Streaming

An End-to-End Video Content Encryption Module for HLS Video Streaming

Kazim Rizvi, Bhavisha J. Dholakia, Aditya Kaushik, Aswani Kumar Cherukuri, Chandra Mouliswaran S.
ISBN13: 9781799883678|ISBN10: 1799883671|ISBN13 Softcover: 9781668442838|EISBN13: 9781799883685
DOI: 10.4018/978-1-7998-8367-8.ch007
Cite Chapter Cite Chapter

MLA

Rizvi, Kazim, et al. "An End-to-End Video Content Encryption Module for HLS Video Streaming." Advancing Smarter and More Secure Industrial Applications Using AI, IoT, and Blockchain Technology, edited by Kavita Saini and Pethuru Raj, IGI Global, 2022, pp. 137-152. https://doi.org/10.4018/978-1-7998-8367-8.ch007

APA

Rizvi, K., Dholakia, B. J., Kaushik, A., Cherukuri, A. K., & S., C. M. (2022). An End-to-End Video Content Encryption Module for HLS Video Streaming. In K. Saini & P. Raj (Eds.), Advancing Smarter and More Secure Industrial Applications Using AI, IoT, and Blockchain Technology (pp. 137-152). IGI Global. https://doi.org/10.4018/978-1-7998-8367-8.ch007

Chicago

Rizvi, Kazim, et al. "An End-to-End Video Content Encryption Module for HLS Video Streaming." In Advancing Smarter and More Secure Industrial Applications Using AI, IoT, and Blockchain Technology, edited by Kavita Saini and Pethuru Raj, 137-152. Hershey, PA: IGI Global, 2022. https://doi.org/10.4018/978-1-7998-8367-8.ch007

Export Reference

Mendeley
Favorite

Abstract

For an individual or a small organization, protecting and securing content could be a new and challenging task. The existing options do not completely fulfill the demands for today's content consumption and security while providing a good customer experience. The authors came across this problem of content security as a small group while building an application and tried to find a simple solution to secure content for playback on Android, so that the end users would be able to stream seamlessly and without any hindrance caused due to the enhanced security. They explore the way of securing video content through AES and using HLS to enable streaming of those video files over the internet. At the client's end, they have used Google's exoplayer to decrypt the data and play it directly after authentication and authorization. They performed a comparative analysis of the current models with the given model of securing content. Overall, with the aim to create an end-to-end module, they show how all the elements interact and work together as a system to provide protection against external threats.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.